Data Breaches Reports

Infographic: 5 cybersecurity trends for 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
Posted: 16 Jan 2023 | Published: 17 Jan 2023

TechTarget ComputerWeekly.com

E-Book - Online Fraud: Mitigation and Detection to Reduce the Threat of Online Crime
sponsored by TechTarget Security
EBOOK: As our economy struggles to regain its footing, online fraud is more prevalent than ever. In this E-Book, experts reveal a model for common fraud and present tips on easing fraud pains. Also, find out how financial fraud affects consumer bank behavior. Read on to learn more.
Posted: 01 Oct 2009 | Published: 31 Aug 2009

TechTarget Security

5 Steps to Raising Ransomware Resistance
sponsored by TechTarget Security
EBOOK: This TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

TechTarget Security

What to Look for in Web Application Firewall Products
sponsored by TechTarget Security
EBOOK: In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

TechTarget Security

PCI DSS Success: Archiving Compliance and Increasing Web Application Security
sponsored by Citrix
WHITE PAPER: This paper elaborates on the changing nature of the PCI DDS landscape and its requirements. It also identifies applicable application network compliance solutions from Citrix Systems Inc..
Posted: 19 Sep 2008 | Published: 18 Sep 2008

Citrix

Underexposed risks of public Wi-Fi hotspots
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-FiĀ  hotspots.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

TechTarget ComputerWeekly.com

Presentation Transcript: Automating Access Certification in Just 17 Days
sponsored by Aveksa
PRESENTATION TRANSCRIPT: This presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process.
Posted: 10 Aug 2012 | Published: 10 Aug 2012

Aveksa

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

Credit Issuers: Stop Application Fraud At The Source With Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.